In many real applications that use and analyze networked data, the links in the network graph may be erroneous, or derived from prob-abilistic techniques. In such cases, the node classification problem can be challenging, since the unreliability of the links may affect the final results of the classification process. In this paper, we focus on situations that require the analysis of the uncertainty that is present in the graph structure. We study the novel problem of node classification in uncertain graphs, by treating uncertainty as a first-class citizen. We propose two techniques based on a Bayes model, and show the benefits of incorporating uncertainty in the classification process as a first-class citizen. The experimental re-sults demo...
In practical applications of hypergraph theory, we are usually surrounded by the state of indetermin...
We present a novel uncertain network visualization technique based on node-link diagrams. Nodes expa...
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that...
In many real applications that use and analyze networked data, the links in the network graph may be...
Graph data are prevalent in communication networks, social media, and biological networks. These dat...
Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edg...
Abstract. Imprecision, incompleteness and dynamic exist in wide range of net-work applications. It i...
Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edg...
There is a growing need for methods which can capture uncertain-ties and answer queries over graph-s...
An uncertain graph G = (V,E,p) can be viewed as a probability space whose outcomes (referred to as p...
Classification of high dimensional data finds wide-ranging applications. In many of these applicatio...
Data in several applications can be represented as an uncertain graph whose edges are labeled with a...
International audienceLarge graphs are prevalent in social networks, traffic networks, and biology. ...
International audienceWe consider the problem of node classification in heterogeneous graphs where b...
Data in several applications can be represented as an uncertain graph, whose edges are labeled with ...
In practical applications of hypergraph theory, we are usually surrounded by the state of indetermin...
We present a novel uncertain network visualization technique based on node-link diagrams. Nodes expa...
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that...
In many real applications that use and analyze networked data, the links in the network graph may be...
Graph data are prevalent in communication networks, social media, and biological networks. These dat...
Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edg...
Abstract. Imprecision, incompleteness and dynamic exist in wide range of net-work applications. It i...
Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edg...
There is a growing need for methods which can capture uncertain-ties and answer queries over graph-s...
An uncertain graph G = (V,E,p) can be viewed as a probability space whose outcomes (referred to as p...
Classification of high dimensional data finds wide-ranging applications. In many of these applicatio...
Data in several applications can be represented as an uncertain graph whose edges are labeled with a...
International audienceLarge graphs are prevalent in social networks, traffic networks, and biology. ...
International audienceWe consider the problem of node classification in heterogeneous graphs where b...
Data in several applications can be represented as an uncertain graph, whose edges are labeled with ...
In practical applications of hypergraph theory, we are usually surrounded by the state of indetermin...
We present a novel uncertain network visualization technique based on node-link diagrams. Nodes expa...
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that...